Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Microsoft Internet Explorer
Опубликовано:16 декабря 2013 г.
Источник:
SecurityVulns ID:13454
Тип:клиент
Уровень опасности:
8/10
Описание:Многочисленные повреждения памяти и повышения привилегий.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
 MICROSOFT : Windows 8
 MICROSOFT : Windows 2012 Server
 MICROSOFT : Windows 8.1
CVE:CVE-2013-5052 (Microsoft Internet Explorer 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability.")
 CVE-2013-5051 (Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability.")
 CVE-2013-5049 (Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability.")
 CVE-2013-5048 (Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5047.)
 CVE-2013-5047 (Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5048.)
 CVE-2013-5046 (Microsoft Internet Explorer 7 through 11 allows local users to bypass the Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code, aka "Internet Explorer Elevation of Privilege Vulnerability.")
 CVE-2013-5045 (Microsoft Internet Explorer 10 and 11 allows local users to bypass the Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code, aka "Internet Explorer Elevation of Privilege Vulnerability.")
Файлы:Microsoft Security Bulletin MS13-097 - Critical Cumulative Security Update for Internet Explorer (2898785)

Многочисленные уязвимости безопасности в Microsoft Exchange Server
Опубликовано:16 декабря 2013 г.
Источник:
SecurityVulns ID:13455
Тип:удаленная
Уровень опасности:
9/10
Описание:Выполнение кода в machine authentication check, меэсайтовый скриптинг, уязвимости в компонентах Oracle.
Затронутые продукты:MICROSOFT : Exchange 2007
 MICROSOFT : Exchange 2010
 MICROSOFT : Exchange 2013
CVE:CVE-2013-5791 (Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.4.1 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. NOTE: the previous information is from the October 2013 CPU. Oracle has not commented on claims from a third party that the issue is a stack-based buffer overflow in the Microsoft Access 1.x parser in vsacs.dll before 8.4.0.108 and before 8.4.1.52, which allows attackers to execute arbitrary code via a long field (aka column) name.)
 CVE-2013-5763 (Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Maintenance. NOTE: the original disclosure of this issue erroneously mapped it to CVE-2013-3624.)
 CVE-2013-5072 (Cross-site scripting (XSS) vulnerability in Outlook Web Access in Microsoft Exchange Server 2010 SP2 and SP3 and 2013 Cumulative Update 2 and 3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability.")
 CVE-2013-1330 (The default configuration of Microsoft SharePoint Portal Server 2003 SP3, SharePoint Server 2007 SP3 and 2010 SP1 and SP2, and Office Web Apps 2010 does not set the EnableViewStateMac attribute, which allows remote attackers to execute arbitrary code by leveraging an unassigned workflow, aka "MAC Disabled Vulnerability.")

Выполнение кода в Microsoft SharePoint
Опубликовано:16 декабря 2013 г.
Источник:
SecurityVulns ID:13456
Тип:библиотека
Уровень опасности:
7/10
Описание:Возможно выполнение кода при возможности внедрения данных в страницу SharePoint.
Затронутые продукты:MICROSOFT : SharePoint 2010
 MICROSOFT : SharePoint 2013
 MICROSOFT : Office Web Apps 2013
CVE:CVE-2013-5059 (Microsoft SharePoint Server 2010 SP1 and SP2 and 2013, and Office Web Apps 2013, allows remote attackers to execute arbitrary code via crafted page content, aka "SharePoint Page Content Vulnerabilities.")
Файлы:Microsoft Security Bulletin MS13-100 - Important Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2904244)

Межсайтовый скриптинг в библиотеке Microsoft SignalR
Опубликовано:16 декабря 2013 г.
Источник:
SecurityVulns ID:13457
Тип:библиотека
Уровень опасности:
5/10
Описание:Межсайтовый скриптинг в транспорте Forever Frame.
Затронутые продукты:MICROSOFT : ASP.NET SignalR 2.0
CVE:CVE-2013-5042 (Cross-site scripting (XSS) vulnerability in Microsoft ASP.NET SignalR 1.1.x before 1.1.4 and 2.0.x before 2.0.1, and Visual Studio Team Foundation Server 2013, allows remote attackers to inject arbitrary web script or HTML via crafted Forever Frame transport protocol data, aka "SignalR XSS Vulnerability.")
Файлы:Microsoft Security Bulletin MS13-103 - Important Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (2905244)

Уязвимости безопасности в Microsoft Office
Опубликовано:16 декабря 2013 г.
Источник:
SecurityVulns ID:13458
Тип:библиотека
Уровень опасности:
6/10
Описание:Утечка информации при работе с файлами Sharepoint, утечка информации в Microsoft Office Shared Component.
Затронутые продукты:MICROSOFT : Office 2007
 MICROSOFT : Office 2010
 MICROSOFT : Office 2013
CVE:CVE-2013-5057 (hxds.dll in Microsoft Office 2007 SP3 and 2010 SP1 and SP2 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted COM component on a web site that is visited with Internet Explorer, as exploited in the wild in December 2013, aka "HXDS ASLR Vulnerability.")
 CVE-2013-5054 (Microsoft Office 2013 and 2013 RT allows remote attackers to discover authentication tokens via a crafted response to a file-open request for an Office file on a web site, as exploited in the wild in 2013, aka "Token Hijacking Vulnerability.")
Файлы:Microsoft Security Bulletin MS13-104 - Important Vulnerability in Microsoft Office Could Allow Information Disclosure (2909976)
 Microsoft Security Bulletin MS13-106 - Important Vulnerability in a Microsoft Office Shared Component Could Allow Security Feature Bypass (2905238)

Многочисленные уязвимости безопасности в Microsoft Windows
дополнено с 16 декабря 2013 г.
Опубликовано:30 декабря 2013 г.
Источник:
SecurityVulns ID:13453
Тип:библиотека
Уровень опасности:
9/10
Описание:Повреждение памяти при разборе графики, обход проверки подписи, использование памяти после освобождения в скприптинге, многочисленные повышения привилегий.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
 MICROSOFT : Windows 8
 MICROSOFT : Windows 2012 Server
 MICROSOFT : Windows 8.1
CVE:CVE-2013-5058 (Integer overflow in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows local users to gain privileges via a crafted application, aka "Win32k Integer Overflow Vulnerability.")
 CVE-2013-5056 (Use-after-free vulnerability in the Scripting Runtime Object Library in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site that is visited with Internet Explorer, aka "Use-After-Free Vulnerability in Microsoft Scripting Runtime Object Library.")
 CVE-2013-3907 (portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability.")
 CVE-2013-3906 (GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.)
 CVE-2013-3903 (Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to cause a denial of service (reboot) via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability.")
 CVE-2013-3902 (Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability.")
 CVE-2013-3900 (The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote attackers to execute arbitrary code via a crafted PE file, aka "WinVerifyTrust Signature Validation Vulnerability.")
 CVE-2013-3899 (win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate addresses, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability.")
 CVE-2013-3878 (Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability.")
Оригинальный текстdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2013-0807 - Divide Error in Windows Kernel (30.12.2013)
Файлы:Microsoft Security Bulletin MS13-096 - Critical Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution (2908005)
 Microsoft Security Bulletin MS13-098 - Critical Vulnerability in Windows Could Allow Remote Code Execution (2893294)
 Microsoft Security Bulletin MS13-099 - Critical Vulnerability in Microsoft Scripting Runtime Object Library Could Allow Remote Code Execution (2909158)
 Microsoft Security Bulletin MS13-101 - Important Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430)
 Microsoft Security Bulletin MS13-102 - Important Vulnerability in LRPC Client Could Allow Elevation of Privilege (2898715)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород